Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

OmniCenter from Netreo

Automation is vital, and OmniCenter from Netreo is devoted to this vital work. Rapid to deploy and..

43

IoT at scale

The Internet of Things (IoT) is potentially on the brink of mass deployment - but some help is needed...

Careful sharing

We share information with customers, suppliers and partners every day, but sometimes we are asked for too much information,..

The SME risk

With the headlines repeatedly dominated by serious security incidents at large well-known companies, including the likes of Equifax and..

Industrial network security

Supervisory control and data acquisition (SCADA) environments have typically been separated from traditional computer networks, which has secured them..

Digital communication: the next step

DLT (Distributed Ledger Technology) is a new concept for decentralising digital transactions across a network of untrusted computers. Although..

Licensed to trade

The software industry contributes more than £826bn to the EU's GDP, and this establishes software as an important business..

Atypical security

Fuzz testing or fuzzing refers to a form of software testing with deliberately malformed or unexpected inputs to see..

Seismic cyber aftershock

Effective cyber security is in large part making sure that nothing sinister infiltrates the network. Thinking about the fallout..

DNS: safety in numbers

For many enterprises, avoiding single points of failure only becomes a priority when something unexpected happens. This is a..

The people premium

High profile cyber-attacks, such as WannaCry and Petya, have compromised the activities of both big brands and governments. All..

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

The big data advantage

As data continues to grow at an explosive rate, it is conspiring to dramatically change the way that we..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Securing software-based IP

The task of internally securing software-based intellectual property (IP) and confidential product data against the insider threat is a..

Lean wireless networks

Our always-on culture is demanding and as mobile device usage increases, demand for connectivity follows. Wi-Fi users expect high-performance..

Controlling borders today

In 2015, BT announced that it would switch off its UK integrated services digital network (ISDN) by 2025, reflecting..

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

108
19

A revolution in data storage

What is the current state of storage tape technology?

Richard Alderson: We are in quite a surprising situation right now...

The A to Z of networking

One of the big challenges for many network professionals is to gain full and contextual visibility of their network, and..

Adapt or die

As technology in the data centre evolves, the role of people working in Network Operations (NetOps) must adapt. This..

Transforming security

The use of cloud, social and mobile technologies has permeated the enterprise to such an extent that a term..

Not built here...

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Putting the customer first

Digital transformation was a hot topic throughout 2016 and as pervasive access to new digital technology grows, this will no..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

Scamming the Scammers

Criminals have had years to refine their playbook, with many relying on low-tech techniques that are simple to execute,..

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Cyber-insanity

From claims of fake news to allegations of state-sponsored hacks, the role of data security is on stark display. We're..

Network fluidity

Worldwide spending on digital transformation technologies is set to reach more than $1.2 trillion by the end of 2017...

The people premium

High profile cyber-attacks, such as WannaCry and Petya, have compromised the activities of both big brands and governments. All..

WAN congestion

Explosive growth in real time applications, distributed enterprises and cloud computing is placing growing strain on network infrastructure. This..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

New field of operations

T H White Group is a UK-based, privately-owned, multi-site agricultural supplier with a fascinating history. It was founded in..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

The A to Z of networking

While it is true that, generally speaking, more people know more about IT and its subordinate disciplines than ever..

Transforming with SDN

Unlike most components of the IT estate, the price and performance attributes of WAN services have not obeyed Moore's..

Outcome driven networking

Software Defined Wide Area Networking (SD-WAN) is disruptive and a business enabler. It is already transforming traditional networks such..

DNS: safety in numbers

For many enterprises, avoiding single points of failure only becomes a priority when something unexpected happens. This is a..

The hacker crowd

Whatever your do to defend against hackers, there's a good chance it's not working as you would like. Worse still,..

A living security policy

As more of us become cybercrime targets, the need to embed a culture of security into every business becomes..

Closing the detection gap

Organisations continue to invest heavily in defensive cybersecurity solutions, but for many, the results are disappointing. Preventive measures provide little..

Skills creation

With university fees on the increase, many secondary school graduates are looking for a less expensive and more practical..

Connectivity's new clothes?

Changing at pace, the IT industry is driven largely by user demand and massive growth in the adoption and..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Seismic cyber aftershock

Effective cyber security is in large part making sure that nothing sinister infiltrates the network. Thinking about the fallout..

Internet stressors

This year is set to be one of the most interesting and tumultuous so far in terms of cyber security...

Not built here…

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

IoT at scale

The Internet of Things (IoT) is potentially on the brink of mass deployment - but some help is needed...

The Ghost in the Machine

Artificial intelligence has been a hot technology for 2017. It can enhance applications ranging from storage optimisation through to..

Industrial network security

Supervisory control and data acquisition (SCADA) environments have typically been separated from traditional computer networks, which has secured them..

The SME risk

With the headlines repeatedly dominated by serious security incidents at large well-known companies, including the likes of Equifax and..

Digital communication: the next step

DLT (Distributed Ledger Technology) is a new concept for decentralising digital transactions across a network of untrusted computers. Although..

Licensed to trade

The software industry contributes more than £826bn to the EU's GDP, and this establishes software as an important business..

Careful sharing

We share information with customers, suppliers and partners every day, but sometimes we are asked for too much information,..

The sin of ignorance

Ransomware is wreaking havoc across small UK businesses, leaving many in a perilous position and in some cases causing..

Is anybody there?

Following the huge DDoS events of 2016, it's easy to become complacent about the small, well-hidden DDoS attacks that..

Could you be a hacker?

Throughout my career auditing and advising organisations on cybersecurity, I have found that thinking like a cybercriminal is often..

The dark web intelligence

The dark web can seem confusing and there has been much speculation and mystery around it, but could it..

Weaponised data

Credential compromise encompasses the theft, spilling and stuffing of user account information. In effect it is an end-to-end cycle..

Atypical security

Fuzz testing or fuzzing refers to a form of software testing with deliberately malformed or unexpected inputs to see..

67

IoT at scale

The Internet of Things (IoT) is potentially on the brink of mass deployment - but some help is needed...

The Ghost in the Machine

Artificial intelligence has been a hot technology for 2017. It can enhance applications ranging from storage optimisation through to..

Is anybody there?

Following the huge DDoS events of 2016, it's easy to become complacent about the small, well-hidden DDoS attacks that..

Could you be a hacker?

Throughout my career auditing and advising organisations on cybersecurity, I have found that thinking like a cybercriminal is often..

The sin of ignorance

Ransomware is wreaking havoc across small UK businesses, leaving many in a perilous position and in some cases causing..

The A to Z of networking

While it is true that, generally speaking, more people know more about IT and its subordinate disciplines than ever..

Careful sharing

We share information with customers, suppliers and partners every day, but sometimes we are asked for too much information,..

The SME risk

With the headlines repeatedly dominated by serious security incidents at large well-known companies, including the likes of Equifax and..

Industrial network security

Supervisory control and data acquisition (SCADA) environments have typically been separated from traditional computer networks, which has secured them..

Digital communication: the next step

DLT (Distributed Ledger Technology) is a new concept for decentralising digital transactions across a network of untrusted computers. Although..

Licensed to trade

The software industry contributes more than £826bn to the EU's GDP, and this establishes software as an important business..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Weaponised data

Credential compromise encompasses the theft, spilling and stuffing of user account information. In effect it is an end-to-end cycle..

The dark web intelligence

The dark web can seem confusing and there has been much speculation and mystery around it, but could it..

Atypical security

Fuzz testing or fuzzing refers to a form of software testing with deliberately malformed or unexpected inputs to see..

A revolution in data storage

What is the current state of storage tape technology?

Richard Alderson: We are in quite a surprising situation right now...

New field of operations

T H White Group is a UK-based, privately-owned, multi-site agricultural supplier with a fascinating history. It was founded in..

Transforming security

The use of cloud, social and mobile technologies has permeated the enterprise to such an extent that a term..

Skills creation

With university fees on the increase, many secondary school graduates are looking for a less expensive and more practical..

Adapt or die

As technology in the data centre evolves, the role of people working in Network Operations (NetOps) must adapt. This..

Transforming with SDN

Unlike most components of the IT estate, the price and performance attributes of WAN services have not obeyed Moore's..

Connectivity's new clothes?

Changing at pace, the IT industry is driven largely by user demand and massive growth in the adoption and..

Network fluidity

Worldwide spending on digital transformation technologies is set to reach more than $1.2 trillion by the end of 2017...

WAN congestion

Explosive growth in real time applications, distributed enterprises and cloud computing is placing growing strain on network infrastructure. This..

Outcome driven networking

Software Defined Wide Area Networking (SD-WAN) is disruptive and a business enabler. It is already transforming traditional networks such..

A living security policy

As more of us become cybercrime targets, the need to embed a culture of security into every business becomes..

Seismic cyber aftershock

Effective cyber security is in large part making sure that nothing sinister infiltrates the network. Thinking about the fallout..

DNS: safety in numbers

For many enterprises, avoiding single points of failure only becomes a priority when something unexpected happens. This is a..

Scamming the Scammers

Criminals have had years to refine their playbook, with many relying on low-tech techniques that are simple to execute,..

The people premium

High profile cyber-attacks, such as WannaCry and Petya, have compromised the activities of both big brands and governments. All..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Not built here...

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Putting the customer first

Digital transformation was a hot topic throughout 2016 and as pervasive access to new digital technology grows, this will no..

Not built here…

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Closing the detection gap

Organisations continue to invest heavily in defensive cybersecurity solutions, but for many, the results are disappointing. Preventive measures provide little..

The A to Z of networking

One of the big challenges for many network professionals is to gain full and contextual visibility of their network, and..

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

Internet stressors

This year is set to be one of the most interesting and tumultuous so far in terms of cyber security...

Cyber-insanity

From claims of fake news to allegations of state-sponsored hacks, the role of data security is on stark display. We're..

The hacker crowd

Whatever your do to defend against hackers, there's a good chance it's not working as you would like. Worse still,..

67